Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/WCNC49053.2021.9417516guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Resource Allocation for Secrecy Rate Optimization in UAV-assisted Cognitive Radio Network

Authors Info & Claims
Published:29 March 2021Publication History

ABSTRACT

Cognitive radio (CR) as a key technology of solving the problem of low spectrum utilization has attracted wide attention in recent years. However, due to the open nature of the radio, the communication links can be eavesdropped by illegal user, resulting to severe security threat. Unmanned aerial vehicle (UAV) equipped with signal sensing and data transmission module, can access to the unoccupied channel to improve network security performance by transmitting artificial noise (AN) in CR networks. In this paper, we propose a resource allocation scheme for UAV-assisted overlay CR network. Based on the result of spectrum sensing, the UAV decides to play the role of jammer or secondary transmitter. The power splitting ratio for transmitting secondary signal and AN is introduced to allocate the UAV’s transmission power. Particularly, we jointly optimize the spectrum sensing time, the power splitting ratio and the hovering position of the UAV to maximize the total secrecy rate of primary and secondary users. The optimization problem is highly intractable, and we adopt an adaptive inertia coefficient particle swarm optimization (A-PSO) algorithm to solve this problem. Simulation results show that the proposed scheme can significantly improve the total secrecy rate in CR network.

References

  1. [1].Sharmila A. and Dananjayan P., ”Spectrum Sharing Techniques in Cognitive Radio Networks – A Survey,” 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 2019, pp. 14.Google ScholarGoogle Scholar
  2. [2].Nguyen V., Duong T. Q., Dobre O. A. and Shin O., ”Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks,” in IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 26092623, Nov. 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3].Goel S. and Negi R., ”Guaranteeing Secrecy using Artificial Noise,” in IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 21802189, June 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4].Cai Y., Cui F., Shi Q. and Li G. Y., ”Joint Trajectory and User Scheduling Optimization for Dual-UAV Enabled Secure Communications,” 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, 2018, pp. 16.Google ScholarGoogle Scholar
  5. [5].Li B., Fei Z., Dai Y. and Zhang Y., ”Secrecy-Optimized Resource Allocation for UAV-Assisted Relaying Networks,” 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 2018, pp. 16.Google ScholarGoogle Scholar
  6. [6].Wang Q., Dai H., Wang H., Xu G. and Sangaiah A. K., ”UAV-enabled friendly jamming scheme to secure industrial Internet of Things,” in Journal of Communications and Networks, vol. 21, no. 5, pp. 481490, Oct. 2019.Google ScholarGoogle Scholar
  7. [7].Zhou X., Wu Q., Yan S., Shu F. and Li J., ”UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization,” in IEEE Transactions on Vehicular Technology, vol. 68, no. 4, pp. 40694073, April 2019.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8].He Y., Evans J. and Dey S., ”Secrecy rate maximization for cooperative overlay cognitive radio networks with artificial noise,” 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, 2014, pp. 16631668.Google ScholarGoogle Scholar
  9. [9].Nguyen V., Duong T. Q., Shin O., Nallanathan A. and Karagiannidis G. K., ”Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications,” in IEEE Transactions on Cognitive Communications and Networking, vol. 3, no. 4, pp. 599613, Dec. 2017.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10].Nguyen P. X., Nguyen H. V., Nguyen V. and Shin O., ”UAV-Enabled Jamming Noise for Achieving Secure Communications in Cognitive Radio Networks,” 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 2019, pp. 16.Google ScholarGoogle Scholar
  11. [11].Chen S., Li X., Luo C., Ji H. and Zhang H., ”Energy-Efficient Power, Position and Time Control in UAV-Assisted Wireless Networks,” 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 2019, pp. 16, doi: 10.1109/GCWkshps45667.2019.9024568.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12].Liang Y., Zeng Y., Peh E. C. Y. and Hoang A. T., ”Sensing-Throughput Tradeoff for Cognitive Radio Networks,” in IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 13261337, April 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13].Kennedy J. and Eberhart R., ”Particle swarm optimization,” Proceedings of ICNN’95 - International Conference on Neural Networks, Perth, WA, Australia, 1995, pp. 19421948 vol.4.Google ScholarGoogle Scholar
  14. [14].Pan Y., Da X., Hu H., Zhu Z., Xu R. and Ni L., ”Energy-Efficiency Optimization of UAV-Based Cognitive Radio System,” in IEEE Access, vol. 7, pp. 155381155391, 2019.Google ScholarGoogle Scholar

Index Terms

  1. Resource Allocation for Secrecy Rate Optimization in UAV-assisted Cognitive Radio Network
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image Guide Proceedings
        2021 IEEE Wireless Communications and Networking Conference (WCNC)
        Mar 2021
        2195 pages

        Copyright © 2021

        Publisher

        IEEE Press

        Publication History

        • Published: 29 March 2021

        Qualifiers

        • research-article